The legislature caught up with the passengers of information technology protection

Tariq Radwan: The anti-information technology law bridges the breach of privacy gap

The head of the Human Rights Committee in the House of Representatives, representative Tariq Radwan, said that the legislative authority in Egypt has begun to take steps to catch up with the protection of information technology and rapid technological development through the issuance of the Anti-Information Technology “Cybercrime” Act No. 175 of 2018 and its executive regulations in 2020.

Conference on Advances in Artificial Intelligence

This came yesterday, Thursday, in his speech during the international conference on the challenges of protecting the right to privacy in the light of the developments of artificial intelligence, which was held in partnership between the Arab Organization for Human Rights and the Permanent High Committee for Human Rights of the Ministry of Foreign Affairs.

The Information Technology Protection Act fills various gaps such as privacy infringement

Radwan added that this law bridges the various gaps in combating these crimes and sets penalties for those who violate the sanctity of private life and abusive use of websites and electronic means, especially in crimes related to women.

The strategy represents the first yield in ensuring legislative privacy

He explained that with the launch of the first national strategy on human rights in Egypt in 2021, the strategy indicated the need to guarantee the right to privacy within a legislative framework, especially the need to amend the Criminal Procedure Code to enforce the constitutional obligation to protect the privacy of victims, witnesses, accused and whistleblowers.

The Egyptian Parliament works intensively in both legislative directions and responds to urgent needs

He stressed that the Egyptian parliament is still working intensively in two directions, the first is to take up dozens of legislative claims imposed by the constitution, and the second is to speed up the response to urgent legislative needs to urgent phenomena and other phenomena of an exceptional Domestic crime, cross-border crimes and emerging crimes, to ensure the protection of society against any threats.

We are currently witnessing an unprecedented boom in the development of information technology

He continued, “We are currently witnessing an unprecedented boom in the development of information and communication technology in all aspects of life, scientific, cultural and social, and the development continues to go further to manage information and manipulate and infringe on people’s freedom, life and dignity.”

The information technology conference coincides with Egypt’s developments on human rights

Radwan added that this conference coincides with important Egyptian developments in the field of human rights, as human rights issues have become at the top of the national action agenda in the context of the adoption and activation of the national strategy for human rights. strengthening societal protection, and actively reviewing the position of detainees in public affairs cases with the aim of releasing all who were not involved in violence and bloodshed, there are approximately 30 legislative projects and legislative amendments currently under consideration after completion of its preparation in consultation with stakeholders.

The Egyptian state has been trying to keep up with the legislative structure for decades

He explained that the Egyptian state has been trying for years to strengthen the legislative structure and keep pace with social development, especially with regard to the protection of information and data. The enormous guarantees added by the Egyptian Constitution of 2014 are in line with and exceeds international human rights standards, including the affirmation in article (57) that private life is protected. It does not affect, including electronic correspondence and means of communication, in addition to the protection of personal freedom or the sanctity of the private life of citizens, and that crimes of the violation of these rights are not subject to a statute of limitations in the text of Article 99 .

Information technology conference sheds light on recent technological developments

Radwan further said that this conference was held to shed light on the scope of technological development and artificial intelligence and the change it has contributed to the image of the world and the virtual reality in which we live and forms of social, cultural and educational communication , which points out that ways will be discussed to address the negative impact of this development on the enjoyment of the right to privacy as a right Intrinsic person and its impact on human dignity.

The IT conference comes at a great time

He pointed out that this conference comes at a very important time for the tremendous technological development, as with the increasing pace of development, it has been found that it is easy for a person to become prey and victim of crimes that depend on the terrifying technological development based on artificial intelligence, or to violate human rights or It threatens human privacy, as well as the inadequacy and effectiveness of legal protection at the practical and operational levels.
He emphasized that the majority of people in our societies have become potential victims of cybercrime and the violation of their privacy, either intentionally or unintentionally, just by browsing, using applications on their mobile phones, spreading false information and in the waves of ” social media”.

Ways to protect society from information crimes

He pointed out that this conference aims to propose ways and means to confront this matter to ensure the protection of the society and its rights and keep track of the development of crimes with a legislative, proportionate and appropriate development that protects the right to privacy. does not limit the technological capabilities of the individual, and increases the status of states in protecting the safety of society against any violations that may threaten its safety or the security of its members.

Leave a Comment